


default search action
Formal to Practical Security 2009
- Véronique Cortier, Claude Kirchner, Mitsuhiro Okada, Hideki Sakurada:

Formal to Practical Security - Papers Issued from the 2005-2008 French-Japanese Collaboration. Lecture Notes in Computer Science 5458, Springer 2009, ISBN 978-3-642-02001-8 - Reynald Affeldt

, Hubert Comon-Lundh:
Verification of Security Protocols with a Bounded Number of Sessions Based on Resolution for Rigid Variables. 1-20 - Charu Arora, Mathieu Turuani:

Validating Integrity for the Ephemerizer's Protocol with CL-Atse. 21-32 - Gergei Bana, Koji Hasebe, Mitsuhiro Okada:

Computational Semantics for First-Order Logical Analysis of Cryptographic Protocols. 33-56 - Claude Barral, Assia Tria:

Fake Fingers in Fingerprint Recognition: Glycerin Supersedes Gelatin. 57-69 - Cas J. F. Cremers, Pascal Lafourcade, Philippe Nadeau:

Comparing State Spaces in Automatic Security Protocol Analysis. 70-94 - Georg Fuchsbauer, David Pointcheval

:
Anonymous Consecutive Delegation of Signing Rights: Unifying Group and Proxy Signatures. 95-115 - Yuki Hara, Taiki Ishiwata, Junji Shikata, Tsutomu Matsumoto:

Unconditionally Secure Blind Authentication Codes: The Model, Constructions, and Links to Commitment. 116-137 - Malika Izabachène, David Pointcheval

:
New Anonymity Notions for Identity-Based Encryption. 138-157 - Yusuke Kawamoto

, Hideki Sakurada, Masami Hagiya:
Computationally Sound Formalization of Rerandomizable RCCA Secure Encryption. 158-180 - Toshiyuki Maeda, Akinori Yonezawa:

Writing an OS Kernel in a Strictly and Statically Typed Language. 181-197

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














